Razvi Doomun
Razvi Doomun
Senior Lecturer, University of Mauritius
Verified email at uom.ac.mu
Cited by
Cited by
Business process modelling, simulation and reengineering: call centres
R Doomun, NV Jungum
Business Process Management Journal, 2008
Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security.
MR Doomun, KMS Soyjaudah
IJ Network Security 9 (1), 82-94, 2009
An energy‐efficient and security aware route selection protocol for wireless sensor networks
T Hayajneh, R Doomun, G Al‐Mashaqbeh, BJ Mohd
Security and Communication Networks 7 (11), 2015-2038, 2014
Multi‐level information system security in outsourcing domain
MR Doomun
Business Process Management Journal, 2008
Secloud: Source and destination seclusion using clouds for wireless ad hoc networks
R Doomun, T Hayajneh, P Krishnamurthy, D Tipper
2009 IEEE Symposium on Computers and Communications, 361-367, 2009
Low-cost bluetooth mobile positioning for location-based application
MZ Barahim, MR Doomun, N Joomun
2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-4, 2007
Integrated green cloud computing architecture
MN Hulkury, MR Doomun
2012 International Conference on Advanced Computer Science Applications and …, 2012
Energy consumption and computational analysis of Rijndael-AES
MR Doomun, KMS Soyjaudah, D Bundhoo
2007 3rd IEEE/IFIP International Conference in Central Asia on Internet, 1-6, 2007
Novel algorithms and techniques in telecommunications and networking
T Sobh, K Elleithy
Springer, 2010
Innovative algorithms and techniques in automation, industrial electronics and telecommunications
T Sobh, K Elleithy, A Mahmood, M Karim
Springer Science & Business Media, 2007
Source—destination obfuscation in wireless ad hocnetworks
T Hayajneh, R Doomun, P Krishnamurthy, D Tipper
Security and Communication Networks 4 (8), 888-901, 2011
Hcrbac–an access control system for collaborative context-aware healthcare services in mauritius
O Moonian, S Cheerkoot-Jalim, SD Nagowah, KK Khedo, R Doomun, ...
Journal of Health Informatics in Developing Countries 2 (2), 2008
Resource saving AES-CCMP design with hybrid counter mode block chaining-MAC
MR Doomun, KMS Soyjaudah
IJCSNS International Journal of Computer Science and Network Security 8 (10 …, 2008
AES-CBC software execution optimization
R Doomun, J Doma, S Tengur
2008 International Symposium on Information Technology 1, 1-8, 2008
AES CCMP Algorithm with N-Way Interleaved Chiper Block Chaining
Z Codabux-Rossan, MR Doomun
University of Mauritius Research Journal 15 (1), 527-544, 2009
Adaptive IEEE 802.11 i security for energy-security optimization
MR Doomun, KMS Soyjaudah
The Third Advanced International Conference on Telecommunications (AICT'07 …, 2007
Review of Software Maintenance Problems and Proposed Solutions in IT consulting firms in Mauritius
VSB Sokappadu, MG SD, R Paavan, VD Ramdoo
International Journal of Computer Applications 156 (4), 2016
Route extrapolation for source and destination camouflage in wireless ad hoc networks
MR Doomun, KMS Soyjaudah
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
Performance of interleaved cipher block chaining in CCMP
Z Codabux-Rossan, MR Doomun
Novel Algorithms and Techniques in Telecommunications and Networking, 53-58, 2010
Collaborative driving support system in mobile pervasive environments
NV Jungum, RM Doomun, SD Ghurbhurrun, S Pudaruth
2008 The Fourth International Conference on Wireless and Mobile …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20